/third_party/mbedtls/programs/ssl/ |
H A D | ssl_context_info.c | 517 uint32_t cert_len, ticket_len; in print_deserialized_ssl_session() local 669 ticket_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session() 673 printf_dbg("Ticket length: %u\n", ticket_len); in print_deserialized_ssl_session() 675 if (ticket_len > 0) { in print_deserialized_ssl_session() 677 CHECK_SSL_END(ticket_len); in print_deserialized_ssl_session() 678 print_hex(ssl, ticket_len, 22, "\t"); in print_deserialized_ssl_session() 679 ssl += ticket_len; in print_deserialized_ssl_session()
|
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | NewSessionTicket.pm | 43 my $ticket_len = unpack('n', $self->data); 44 my $ticket = substr($self->data, 6, $ticket_len);
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | NewSessionTicket.pm | 43 my $ticket_len = unpack('n', $self->data); 44 my $ticket = substr($self->data, 6, $ticket_len);
|
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 1672 int ticket_len, in mbedtls_test_ssl_tls12_populate_session() 1676 (void) ticket_len; in mbedtls_test_ssl_tls12_populate_session() 1754 if (ticket_len != 0) { in mbedtls_test_ssl_tls12_populate_session() 1755 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1759 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1761 session->ticket_len = ticket_len; in mbedtls_test_ssl_tls12_populate_session() 1786 int ticket_len, in mbedtls_test_ssl_tls13_populate_session() 1789 ((void) ticket_len); in mbedtls_test_ssl_tls13_populate_session() 1823 session->ticket_len in mbedtls_test_ssl_tls13_populate_session() 1671 mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session, int ticket_len, int endpoint_type, const char *crt_file) mbedtls_test_ssl_tls12_populate_session() argument 1785 mbedtls_test_ssl_tls13_populate_session(mbedtls_ssl_session *session, int ticket_len, int endpoint_type) mbedtls_test_ssl_tls13_populate_session() argument [all...] |
/third_party/mbedtls/library/ |
H A D | ssl_tls13_client.c | 717 *identity_len = session->ticket_len; in ssl_tls13_ticket_get_identity() 2842 size_t ticket_len; in ssl_tls13_parse_new_session_ticket() local 2880 ticket_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_new_session_ticket() 2882 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, ticket_len); in ssl_tls13_parse_new_session_ticket() 2883 MBEDTLS_SSL_DEBUG_BUF(3, "received ticket", p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2886 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket() 2889 session->ticket_len = 0; in ssl_tls13_parse_new_session_ticket() 2892 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket() 2896 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2897 p += ticket_len; in ssl_tls13_parse_new_session_ticket() [all...] |
H A D | ssl_tls12_client.c | 363 size_t tlen = ssl->session_negotiate->ticket_len; in ssl_write_session_ticket_ext() 3379 size_t ticket_len; in ssl_parse_new_session_ticket() local 3406 * 4 . 5 ticket_len (n) in ssl_parse_new_session_ticket() 3421 ticket_len = MBEDTLS_GET_UINT16_BE(msg, 4); in ssl_parse_new_session_ticket() 3423 if (ticket_len + 6 + mbedtls_ssl_hs_hdr_len(ssl) != ssl->in_hslen) { in ssl_parse_new_session_ticket() 3430 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket length: %" MBEDTLS_PRINTF_SIZET, ticket_len)); in ssl_parse_new_session_ticket() 3440 if (ticket_len == 0) { in ssl_parse_new_session_ticket() 3446 ssl->session->ticket_len); in ssl_parse_new_session_ticket() 3448 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket() 3452 ssl->session_negotiate->ticket_len); in ssl_parse_new_session_ticket() [all...] |
H A D | ssl_tls.c | 295 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy() 300 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy() 3490 used += 3 + session->ticket_len + 4; /* len + ticket + lifetime */ in ssl_tls12_session_save() 3493 *p++ = MBEDTLS_BYTE_2(session->ticket_len); in ssl_tls12_session_save() 3494 *p++ = MBEDTLS_BYTE_1(session->ticket_len); in ssl_tls12_session_save() 3495 *p++ = MBEDTLS_BYTE_0(session->ticket_len); in ssl_tls12_session_save() 3498 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save() 3499 p += session->ticket_len; in ssl_tls12_session_save() 3686 session->ticket_len = MBEDTLS_GET_UINT24_BE(p, 0); in ssl_tls12_session_load() 3689 if (session->ticket_len ! in ssl_tls12_session_load() [all...] |
H A D | ssl_tls13_server.c | 3283 size_t ticket_len; in ssl_tls13_write_new_session_ticket_body() local 3306 &ticket_len, in ssl_tls13_write_new_session_ticket_body() 3344 MBEDTLS_PUT_UINT16_BE(ticket_len, p, 0); in ssl_tls13_write_new_session_ticket_body() 3346 MBEDTLS_SSL_DEBUG_BUF(4, "ticket", p, ticket_len); in ssl_tls13_write_new_session_ticket_body() 3347 p += ticket_len; in ssl_tls13_write_new_session_ticket_body()
|
H A D | ssl_client.c | 838 (session_negotiate->ticket_len != 0)) { in ssl_prepare_client_hello()
|
/third_party/mbedtls/tests/include/test/ |
H A D | ssl_helpers.h | 549 int ticket_len, 555 int ticket_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_wolfssl.c | 2081 word32 ticket_len = sizeof(conn->session_ticket); in tls_sess_sec_cb() local 2091 &ticket_len) != 1) in tls_sess_sec_cb() 2094 if (ticket_len == 0) in tls_sess_sec_cb() 2098 conn->session_ticket, ticket_len, in tls_sess_sec_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_wolfssl.c | 2088 word32 ticket_len = sizeof(conn->session_ticket); in tls_sess_sec_cb() local 2098 &ticket_len) != 1) in tls_sess_sec_cb() 2101 if (ticket_len == 0) in tls_sess_sec_cb() 2105 conn->session_ticket, ticket_len, in tls_sess_sec_cb()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 1272 size_t MBEDTLS_PRIVATE(ticket_len); /*!< session ticket length */
|